Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Example: Getting Started with Simulation Mode

    The primary use case for simulation mode is when you are evaluating the effectiveness of the IDP Series device as the intrusion prevention system for your network.

    Follow these basic steps to get started:

    1. Read the release notes for your release. The release notes contain important release-related information about release-specific features, unsupported features, changed features, fixed issues, and known issues. The information in the release notes is more current than the information in this guide.
    2. Install the IDP Series appliance, connect the management interface to your network, configure network settings, and configure virtual routers in transparent mode (in-path) or sniffer mode (out-of-path). For details, see the installation guide for your IDP Series device.
    3. Upgrade IDP Series software to the latest version (if applicable).
    4. Add the IDP Series device to the NSM Device Manager.
    5. Update the IDP detector engine and NSM attack object database.
    6. Become familiar with the default security policy (named Recommended).
    7. Use the command-line interface to enable simulation mode.
    8. Connect transit interfaces to the firewall and/or switch. See the installation guide for your IDP Series device.
    9. Use the documentation to become familiar with the product features and user interface:

      • Use the IDP Series Concepts and Examples Guide to become familiar with IDP Series features.
      • Use this guide, the IDP Series Administration Guide, to learn the steps to implement IDP Series features and monitor security events.
      • Use the Appliance Configuration Manager (ACM) online Help for information about using ACM.
      • Use CLI man pages for syntax and parameter hints for CLI commands.
      • Use the NSM online Help for information about using the NSM user interface.
    10. Run Profiler to discover the network hosts you want to protect.
    11. Review logs to verify the initial deployment.
    12. Fine-tune your security policy.

    Published: 2011-02-08